A workflow is a coordinated arrangement of related tasks in an automated process, the systematic execution of which, ultimately achieves some goal. Tasks that comprise the workflow process are typically dependent on one another. Security, in a workflow context, involves the implementation of access control security mechanismsto ensure that task dependencies are coordinated and that tasks are performed by authorized subjects only. A Workflow Authorization Model (WAM) [AH96b] has already been developed to enforce security principles on workflows, by addressing the granting and revoking of authorizations in a Workflow Management System (WFMS). This WAM satisfies most criteria required for an optimal access control model for workflows, some of which cannot be met through pure role-based access control (RBAC) mechanisms. This paper addresses the delegation of task authorizations within a workflow process by subjects in the organizational structure. The proposed The Delegation Authorization Model (DAM) will work within the security constraints imposed by the WAM when deciding whether delegations will be approved or denied. It will also take into account the dynamically determined constraints imposed by the DAM itself.
[1]
Jan H. P. Eloff,et al.
A Context-Sensitive Access Control Model and Prototype Implementation
,
2000,
SEC.
[2]
Jonathan D. Moffett,et al.
Control principles and role hierarchies
,
1998,
RBAC '98.
[3]
Vijayalakshmi Atluri,et al.
SecureFlow: a secure Web-enabled workflow management system
,
1999,
RBAC '99.
[4]
Vijayalakshmi Atluri,et al.
Modeling and Analysis of Workflows Using Petri Nets
,
1998,
Journal of Intelligent Information Systems.
[5]
Ricardo S Silva.
Source
,
2000,
BMJ : British Medical Journal.
[6]
Ravi S. Sandhu,et al.
Role-Based Access Control Models
,
1996,
Computer.
[7]
Frank Leymann,et al.
Production Workflow: Concepts and Techniques
,
1999
.
[8]
Vijayalakshmi Atluri,et al.
An Authorization Model for Workflows
,
1996,
ESORICS.
[9]
Elisa Bertino,et al.
The specification and enforcement of authorization constraints in workflow management systems
,
1999,
TSEC.